2,218 research outputs found

    Si Sapsford: Sight Size and Sargent

    Get PDF

    Statistics for Equal Opportunities in Higher Education: Final Report to HEFCE, SHEFC, HEFCW

    Get PDF
    This report gives the findings and conclusions of a project looking at the availability and use of statistics on discrimination and equality of employment opportunity in the higher education sector, considering both academic and non-academic staff. This represents a small part of a wider programme funded by the three Higher Education Funding Councils exploring how best to monitor the higher education sector in order to avoid discrimination and facilitate the dissemination of good practice

    Socially Inclusive Development : The Foundations for Decent Societies in East and Southern Africa

    Get PDF
    Open access through Springer Compact AgreementPeer reviewedPublisher PD

    Cloud Security : A Review of Recent Threats and Solution Models

    Get PDF
    The most significant barrier to the wide adoption of cloud services has been attributed to perceived cloud insecurity (Smitha, Anna and Dan, 2012). In an attempt to review this subject, this paper will explore some of the major security threats to the cloud and the security models employed in tackling them. Access control violations, message integrity violations, data leakages, inability to guarantee complete data deletion, code injection, malwares and lack of expertise in cloud technology rank the major threats. The European Union invested €3m in City University London to research into the certification of Cloud security services. This and more recent developments are significant in addressing increasing public concerns regarding the confidentiality, integrity and privacy of data held in cloud environments. Some of the current cloud security models adopted in addressing cloud security threats were – Encryption of all data at storage and during transmission. The Cisco IronPort S-Series web security appliance was among security solutions to solve cloud access control issues. 2-factor Authentication with RSA SecurID and close monitoring appeared to be the most popular solutions to authentication and access control issues in the cloud. Database Active Monitoring, File Active Monitoring, URL Filters and Data Loss Prevention were solutions for detecting and preventing unauthorised data migration into and within clouds. There is yet no guarantee for a complete deletion of data by cloud providers on client requests however; FADE may be a solution (Yang et al., 2012)

    Group 2 resistant cleavers control in peas

    Get PDF
    Non-Peer Reviewe

    Anatomical Evidence for Intracardiac Blood Shunting in Marine Turtles

    Get PDF
    Histological examination of the pulmonary arteries of four species of sea turtles revealed the presence of a muscular sphincter just distal to the origin of the ductus Botalli. This structure has not previously been described. Its presence suggests that right to left intra-cardiac blood shunts may be a feature of diving in sea turtles; the sphincter providing a mechanism for the control of blood flow through the heart.The comparative anatomy of the pulmonary arteries of selected terrestrial reptiles suggests that a similar mechanism exists in non-diving species. The possible significance of this is discussed
    • …
    corecore